Consultation to Industry
Publications - Journals
Publications - Conferences
Download Journal Papers
Professional Activities
Membership
Home
e-mail: eloff@cs.up.ac.za
telephone number:(012) 999-9100
|
Prof. Jan Eloff
Download Journal Papers
- 2007
Da Veiga A., Eloff, J.H.P.,
[1] Information security culture - validation of an assessment instrument, Southern African Business Review, 11(1): April 2007.
- 2006
Morkel T, Eloff JHP, Olivier MS,
[1] Using image steganography for decryptor distribution,International Workshop on Information Security (IS’06), Montpellier, France, OTM Workshops 2006, Lecture Notes in Computer Science 4277, pp 322 – 330, ISSN: 0302-9743, Publisher Springer- Verlag Berlin/ Heidelberg 2006
- 2006
Wojcik M, Eloff JHP, Venter HS
[2] Trust Model Architecture: Defining Prejudice by Learning, In Trust and Privacy in Digital Business, Lecture Notes in Computer Science Volume 4083, pp 182-191, ISBN 978-3-540-37750-4, Publisher Springer Berlin / Heidelberg, 2006
- 2006
Obiedkov, S, Kourie, DG, Eloff, JHP,
[3] On Lattices in Access Control Models, Lecture Notes in Artificial Intelligence LNAI 4068, pages 374-387, Edited by J.G. Carbonell & J. Siekmann, Subseries of Lecture Notes in Computer Science, Springer-Verlag Berlin, ISSN: 0302-9743
- 2006
Fei BKL, Eloff JHP, Olivier MS, Venter HS
[4] The use of self-organising maps for anomalous behaviour, detection in a digital investigation, Forensic Science International, Elsevier 2006, Volume 162, Issues 1-3, pp 33-37, 16 Oktober 2006
- 2006
Izadinia, VD, Kourie, DG, Eloff, JHP,
[5] Uncovering Identities: a study into VPN tunnel fingerprinting, Computers & Security Vol. 25 (2), pp 97 – 105, March 2006
- 2005
Coetzee, M, Eloff, JHP
[6] Autonomous trust for Web Services, Internet Research, Vol. 15 (5), pp. 498-507, 2005, (ISSN: 1066-2243)
- 2004
Venter, HS, Olivier, MS, Eloff, JHP,
[7] PIDS: A Privacy Intrusion Detection System, Internet Research, Vol. 14 (5), pp 360-365, 2004, (ISSN 1066-2243)
- 2004
Coetzee, M, Eloff, JHP,
[8] Towards Web Services Access Control, Computers & Security, Vol. 23 (7), pp 559-570, (ISSN 0167-4048)
- 2004
Venter, HS, Eloff, JHP
[9] Vulnerability forecasting-a conceptual model, Computers & Security, Vol. 23 (6), pp 489-497 (ISSN 0167-4048)
- 2003
Venter, HS, Eloff, JHP
[10] Evaluating Vulnerability Scanners Using Harmonised Vulnerability Categories, South African Computer Journal, SACJ 31, pp 40-45, December 2003 (ISSN 1015-7999)
- 2003
Johnston J, Eloff, JHP, Labuschagne L
[11] Security and human computer interfaces, Computers & Security Vol. 22 (8), pp 675-684, December 2003
- 2003
Venter HS, Eloff, JHP
[12] Assessment of Vulnerability scanner, Network Security, pp 11-16, February 2003, ISSN 1353-4858,
- 2003
Venter HS, Eloff, JHP
[13] Taxonomy for Information security technologies, Computers & Security Vol. 22 (4), pp 299-307
- 2002
Venter HS, Eloff, JHP
[14] Harmonising Vulnerability Categories, South African Computer Journal, No. 29, pp. 24 – 31
- 2002
Venter HS, Eloff, JHP
[15] Vulnerabilities categories for intrusion detection systems Computers & Security, Vol. 21 (7), pp 617-619
- 2002
Botha, R, Eloff, JHP
[16] An Access Control Architecture for XML documents in workflow environments, South African Computer Journal, No. 28, pp. 3 – 10
- 2002
Höhne, K, Eloff, JHP,
[17] What makes an Effective Information Security Policy? Network Security, Vol. 2002 (6), pp. 14 – 16
- 2002
Höhne, K, Eloff, JHP,
[18] Information Security Policy – What do International Information Security Standards Say? Computers & Security, Vol. 21 (5), pp. 402 - 409
- 2002
Smith, E, Eloff, JHP
[19] A Prototype for Assessing Information-Technology Risks in Health Care, Computers & Security, Vol. 21 , Issue 3, pp 266 - 284, 1 June 2002
- 2001
Botha, R, Eloff, JHP
[20] Access Control in Document-centric Workflow Systems – An Agent-based Approach, Computers & Security, Vol. 20, No. 6, pp 525 -532, Elsevier, 1 Sept 2001
- 2001
Botha, R, Eloff, JHP
[21] Separation of Duties for Access Control Enforcement in Workflow Environments, IBM Systems Journal, Vol. 40, No. 3, pp 666 - 682
- 2001
Perelson, S, Botha, R, Eloff, JHP
[22] Separation of Duty Administration, South African Computer Journal, No 27, pp 64-69
- 2001
Smith, E, Eloff, JHP
[23] A New Approach to Risk Management in the Health-Care Domain South African Computer Journal, No 27, pp 2-11
- 2001
Trompeter, CM, Eloff, JHP
[24] A Framework for the Implementation of Socio-ethical Controls in Information Security Computers & Security, Vol. 20, No. 5, pp 384 – 391
- 2000
Knorr, K, Stormer, H, Eloff, JHP
[25] A Model for Security in Agent-based Workflows Informatik / Informatique, Vol 6, pp24 -29, Dec 2000
- 2000
Smith, E, Eloff, JHP
[26] Using cognitive fuzzy modeling for enhanced risk assessment in a health-care institution IEEE – Intelligent systems and their applications, Vol. 15 (2), pp 69-75
- 2000
Venter, H, Eloff, JHP
[27] Network Security: Important Issues, Network Security, Vol 2000, Issue 6, pp 12 - 16
- Logout
|